|Publication number||US20030061497 A1|
|Application number||US 09/966,015|
|Publication date||27 Mar 2003|
|Filing date||27 Sep 2001|
|Priority date||27 Sep 2001|
|Also published as||CN1585927A, CN100533385C, DE10297273B4, DE10297273T5, US7103529, WO2003027835A2, WO2003027835A3|
|Publication number||09966015, 966015, US 2003/0061497 A1, US 2003/061497 A1, US 20030061497 A1, US 20030061497A1, US 2003061497 A1, US 2003061497A1, US-A1-20030061497, US-A1-2003061497, US2003/0061497A1, US2003/061497A1, US20030061497 A1, US20030061497A1, US2003061497 A1, US2003061497A1|
|Original Assignee||Zimmer Vincent J.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (5), Referenced by (43), Classifications (7), Legal Events (3)|
|External Links: USPTO, USPTO Assignment, Espacenet|
 This invention relates generally to computing systems having extensible firmware architecture and more specifically to the use of a virtual machine monitor (VMM) to emulate legacy hardware and environment and provide protected storage and execution in a computing system having an extensible firmware architecture.
 A recent development in computer system firmware is an extensible firmware interface (EFI) framework that allows software vendors to develop operating systems programs that can be used with a variety of central processing units (CPUs). An application binary interface (ABI) is included that specifies how to pass data on the stack for a given CPU type. By abstracting the platform, the framework provides many advantages over systems employing legacy architecture. As this concept of component architecture progresses, system architecture is emerging that uses ABIs and software abstraction throughout the entire system initialization process. This includes not only CPU initialization, but chipset and I/O device initialization as well. A software framework is provided that allows multiple parties to write small pieces of code that abstract how portions of the chip set or I/O complex work. Within such a framework, products from various vendors will interoperate. The pieces of code from each vendor are contained in initialization modules. During a system initialization phase (after CPU reset, but prior to memory initialization) core initialization code dispatches the initialization modules in a sequenced order to provide basic services. The initialization phase initializes enough of the system to enable follow-on phases, for example, the driver execution phase that is responsible for initialization processes that are algorithmically more complex such as scanning I/O busses, enumerating resources and installing drivers.
 This concept of allowing contributions of drivers and applications from multiple parties raises several concerns. The security of system firmware, provided by a single vendor, is implicit from the vendor. The incorporation of code modules from various sources imperils system integrity as there is no provision to either sandbox or validate the code. The EFI platform executes in physical mode. Execution in physical mode means that all addresses correspond to actual memory locations. Although execution in physical mode provides the OS loaders with full access to all platform resources, it also precludes the use of virtual memory page tables and the protection they provide in the preboot. Since boot firmware has full machine access, sensitive data structure and code of the core EFI are subject to corruption through access by drivers and applications. Techniques, such as code signing, to validate the source of drivers and applications, cannot guarantee fault isolation when the system state has been corrupted by bad code.
 Another difficulty is legacy code support. For many years software has been written to be compatible with the PC/AT platform. Many legacy operating systems and option ROMs require PC/AT memory-mapped hardware/software. This legacy code executes in Real Mode that limits the processor to 1 Mb of memory and provides no memory management or memory protection features.
 The present invention is illustrated by way of example and not intended to be limited by the figures of the accompanying drawings in which like references indicate similar elements and in which:
FIG. 1 is a diagram illustrating an exemplary computing system 100 for implementing the VMM of the present invention;
FIG. 2 illustrates legacy emulation in accordance with one embodiment of the present invention;
FIG. 3 is a process flow diagram depicting the VMM operation to sandbox an untrusted program in accordance with one embodiment of the present invention; and
FIG. 4 depicts the implementation of a security application through use of a VMM in accordance with one embodiment.
 The present invention provides, in one embodiment, methods and apparatuses to provide the virtualization of system state for the purposes of running legacy compatibility code or protecting key data and code regions for safety and security.
 A VMM is simulator software that provides an efficient replica of the original machine including all of the CPU instructions and system resources (e.g., memory and I/O devices). In one embodiment the VMM is used to maintain a pre-boot security and integrity policy for a component based architecture platform.
 A virtual machine monitor (VMM) is employed to emulate legacy hardware and environment to provide legacy code support. The VMM allows code that is ostensibly privileged (e.g., BIOS code) to be emulated and run without the code realizing its being emulated.
 In the driver execution phase, a driver may be loaded that installs a VMM. Legacy applications (e.g., a legacy OS loader) may then be run within the VMM. In one embodiment the VMM is only loaded if a boot variable is set to indicate that a legacy OS may be booted. The use of a VMM may aid in protecting memory and system structures from application perturbation. The application can be given access to a subset of the system resources, and access to portions of the memory map not designated for updates would trap (program interrupt) to the VMM. A VMM pre-boot policy agent may then protect state and unload any problematic software. The VMM transparently publishes an environment that appears to be the physical mode environment but has safeguards against illegal behavior; it may even map memory such that software sees the legacy memory map below one-megabyte for systems that do not actually decode this physical address range. This transparency maintains compatibility with legacy PC/AT BIOS modules, option ROM's, EFI drivers, and applications.
 In one embodiment the present invention virtualizes the entire PC/AT environment to provide support for legacy OSs and legacy hardware such as the 82XX series: timer counter, serial port, and master/slave interrupt controller. The VM allows a system having an extensible firmware architecture to facilitate pre-boot option ROMs or a run-time environments that don't use its native interfaces. For example, the VM emulates the PC/AT environment allowing a legacy option ROM to run and effect its I/O services. The VMM then translates the results into a native API. That is, the VMM traps the I/O to the semantic equivalent in the native environment.
 In an alternative embodiment a VMM may be used to emulate a native 32 bit/64-bit environment to provide protected storage and protected execution to a platform executing in physical mode. The EFI system architecture doesn't allow for page tables and read-only designations for specified pages because the OS loader may be using the page tables to bootstrap the OS kernel. Use of the VMM provides a way to get under the OS loader to generate and store security-related information to which the bulk of driver and application code has no access.
FIG. 1 is a diagram illustrating an exemplary computing system 100 for implementing the VMM of the present invention. The virtualization of system state for the purposes of running legacy compatible code or protecting key data and code regions for safety and security described herein can be implemented and utilized within computing system 100, which can represent a general-purpose computer, portable computer, or other like device. The components of computing system 100 are exemplary in which one or more components can be omitted or added. For example, one or more memory devices can be utilized for computing system 100.
 Referring to FIG. 1, computing system 100 includes a central processing unit 102 and a signal processor 103 coupled to a display circuit 105, main memory 104, static memory 106, and mass storage device 107 via bus 101. Computing system 100 can also be coupled to a display 121, keypad input 122, cursor control 123, hard copy device 124, input/output (I/O) devices 125, and audio/speech device 126 via bus 101.
 Bus 101 is a standard system bus for communicating information and signals. CPU 102 and signal processor 103 are processing units for computing system 100. CPU 102 or signal processor 103 or both can be used to process information and/or signals for computing system 100. CPU 102 includes a control unit 131, an arithmetic logic unit (ALU) 132, and several registers 133, which are used to process information and signals. Signal processor 103 can also include similar components as CPU 102.
 Main memory 104 can be, e.g., a random access memory (RAM) or some other dynamic storage device, for storing information or instructions (program code), which are used by CPU 102 or signal processor 103. Main memory 104 may store temporary variables or other intermediate information during execution of instructions by CPU 102 or signal processor 103. Static memory 106, can be, e.g., a read only memory (ROM) and/or other static storage devices, for storing information or instructions, which can also be used by CPU 102 or signal processor 103. Mass storage device 107 can be, e.g., a hard or floppy disk drive or optical disk drive, for storing information or instructions for computing system 100.
 Display 121 can be, e.g., a cathode ray tube (CRT) or liquid crystal display (LCD). Display device 121 displays information or graphics to a user. Computing system 100 can interface with display 121 via display circuit 105. Keypad input 122 is an alphanumeric input device with an analog to digital converter. Cursor control 123 can be, e.g., a mouse, a trackball, or cursor direction keys, for controlling movement of an object on display 121. Hard copy device 124 can be, e.g., a laser printer, for printing information on paper, film, or some other like medium. A number of input/output devices 125 can be coupled to computing system 100. The emulation of a legacy environment to support legacy operating systems and legacy option ROMs and the emulation of a physical mode environment to provide protected execution and storage in accordance with the present invention can be implemented by hardware and/or software contained within computing system 100. For example, CPU 102 or signal processor 103 can execute code or instructions stored in a machine-readable medium, e.g., main memory 104.
 The machine-readable medium may include a mechanism that provides (i.e., stores and/or transmits) information in a form readable by a machine such as computer or digital processing device. For example, a machine-readable medium may include a read only memory (ROM), random access memory (RAM), magnetic disk storage media, optical storage media, flash memory devices. The code or instructions may be represented by carrier-wave signals, infrared signals, digital signals, and by other like signals.
FIG. 2 illustrates legacy emulation in accordance with one embodiment of the present invention. Typically, a personal computer motherboard will support legacy 8259 interrupt controllers even though only the legacy option ROM's presuppose their existence; modem operating systems use APIC (IA32) or SAPIC (IPF) for their interrupt support, thus leaving motherboard hardware like paired 8259's usable during a few seconds of machine boot.
 System 200, shown in FIG. 2, includes EFI core 205, a legacy execution image 210, EFI drivers 215, and VMM 220. Legacy execution image 210 may be a preboot option ROM or run-time environment that does not use the native EFI interfaces. Upon a write to a legacy 8259 interrupt control base from legacy execution image 210, for example, the instruction is trapped to the VMM 220. The VMM 220 can trap any instruction that touches the system state (e.g., interrupt flag) or changes protection. If the system is executing in legacy mode, the VMM 220 maps access to the legacy interrupt (PIC) mask to the associated native interrupt control register. For example, the system may attempt access to a legacy hardware not included. The VMM can trap the I/O to the semantic equivalent in the native environment. At this point one of the EFI drivers 215 may communicate with the relevant chipset register and provide the result to the virtual machine. This provides a migration path from the legacy environment.
 A VMM may be used to provide pre-boot security by sandboxing programs from third parties. Running a program in sandbox mode prevents the program from having access to the rest of the system. The code can be trusted, as it cannot harm the rest of the system. The application can be given access to a subset of the system resources, and access to portions of the memory map not designated for updates would trap to the VMM. A VMM pre-boot policy agent may then protect state and unload problematic software.
FIG. 3 is a process flow diagram depicting the VMM operation to sandbox an untrusted program in accordance with one embodiment of the present invention. Process 300, shown in FIG. 3, begins with operation 305 in which an untrusted program attempts an illegal write access. At operation 310 the instruction is trapped to the VMM. If the program is started by EFI core code and if the program has access to the EFI core data structures then access is legal. If not, access is denied at operation 320 and control is returned to the core.
 In one embodiment the VMM may sandbox the state that code introduced from adapter cards and via third-party drivers could corrupt. The small code footprint of such a software technique is advantageous for cost-sensitive, flash memory based systems.
 The VMM executes in privileged mode and emulates privileged mode to execute the EFI environment up to the OS load. Since the VMM abstracts this less privileged code, the VMM can hide portions of the address space. The protected storage and execution that virtualizing protected mode allows becomes part of a security infrastructure.
FIG. 4 depicts the implementation of a security application through use of a VMM in accordance with one embodiment of the present invention. System 400, shown in FIG. 4, includes a preboot authentication driver 405 that evaluates a module 410. The module 410 may contain a digital signature from the vendor. The signature may be a MD5 or SHA-L signature. The preboot authentication driver 405 may call an entry point to the signature logic 421 of VMM 420 to validate the signature. The VMM 420 provides secure storage 422 that may contain the signatures of valid drivers and modules in an attestation log. The attestation log may contain the signatures of code that the system has loaded. If so, the VMM will validate the code, that is, the platform is attesting to having run the code. This provides assurance to the OS, prior to taking control, that the code can be trusted.
 Thus, the VMM provides pre-boot security (i.e., the APIs and framework) to implement a trusted platform up to and including OS loading. At this point the OS loader can provide its own security.
 In the foregoing specification, the invention has been described with reference to specific exemplary embodiments thereof. It will, however, be evident that various modifications and changes may be made thereto without departing from the broader spirit and scope of the invention as set forth in the appended claims. The specification and drawings are, accordingly, to be regarded in an illustrative sense rather than a restrictive sense.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US2151733||4 May 1936||28 Mar 1939||American Box Board Co||Container|
|CH283612A *||Title not available|
|FR1392029A *||Title not available|
|FR2166276A1 *||Title not available|
|GB533718A||Title not available|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7174463 *||4 Oct 2001||6 Feb 2007||Lenovo (Singapore) Pte. Ltd.||Method and system for preboot user authentication|
|US7181723||27 May 2003||20 Feb 2007||Intel Corporation||Methods and apparatus for stride profiling a software application|
|US7328340||27 Jun 2003||5 Feb 2008||Intel Corporation||Methods and apparatus to provide secure firmware storage and service access|
|US7363457||21 Jul 2005||22 Apr 2008||Sun Microsystems, Inc.||Method and system for providing virtualization data services for legacy storage devices|
|US7370324||30 Sep 2003||6 May 2008||Intel Corporation||Switching between a service virtual machine and a guest virtual machine in a virtual machine monitor environment|
|US7380136||25 Jun 2003||27 May 2008||Intel Corp.||Methods and apparatus for secure collection and display of user interface information in a pre-boot environment|
|US7496961||15 Oct 2003||24 Feb 2009||Intel Corporation||Methods and apparatus to provide network traffic support and physical security support|
|US7533207||6 Dec 2006||12 May 2009||Microsoft Corporation||Optimized interrupt delivery in a virtualized environment|
|US7558723 *||12 Dec 2003||7 Jul 2009||Microsoft Corporation||Systems and methods for bimodal device virtualization of actual and idealized hardware-based devices|
|US7571090 *||30 Sep 2004||4 Aug 2009||Intel Corporation||Emulating a host architecture in guest firmware|
|US7725305||8 Jun 2006||25 May 2010||Microsoft Corporation||Partial virtualization on computing device|
|US7974416||5 Jul 2011||Intel Corporation||Providing a secure execution mode in a pre-boot environment|
|US8131534||4 Aug 2009||6 Mar 2012||Intel Corporation||Emulating a host architecture in guest firmware|
|US8578378||28 Jul 2011||5 Nov 2013||Intel Corporation||Facilitating compatible interaction, at least in part|
|US8656487||23 Sep 2005||18 Feb 2014||Intel Corporation||System and method for filtering write requests to selected output ports|
|US8719816||13 Mar 2007||6 May 2014||University Of Utah Research Foundation||Extendable framework for distributed applications and data|
|US8745337 *||19 Dec 2008||3 Jun 2014||Teradyne, Inc.||Apparatus and method for controlling memory overrun|
|US8856473 *||1 Jul 2005||7 Oct 2014||Red Hat, Inc.||Computer system protection based on virtualization|
|US8918879 *||14 May 2012||23 Dec 2014||Trend Micro Inc.||Operating system bootstrap failure detection|
|US9054865 *||16 Nov 2012||9 Jun 2015||V-Key, Inc.||Cryptographic system and methodology for securing software cryptography|
|US9087196 *||24 Dec 2010||21 Jul 2015||Intel Corporation||Secure application attestation using dynamic measurement kernels|
|US20040103299 *||27 Nov 2002||27 May 2004||Zimmer Vincent J.||Providing a secure execution mode in a pre-boot environment|
|US20040243981 *||27 May 2003||2 Dec 2004||Chi-Keung Luk||Methods and apparatus for stride profiling a software application|
|US20040268135 *||25 Jun 2003||30 Dec 2004||Zimmer Vincent J.||Methods and apparatus for secure collection and display of user interface information in a pre-boot environment|
|US20040268141 *||27 Jun 2003||30 Dec 2004||Zimmer Vincent J.||Methods and apparatus to provide secure firmware storage and service access|
|US20050081212 *||30 Sep 2003||14 Apr 2005||Goud Gundrala D.||Switching between a service virtual machine and a guest virtual machine in a virtual machine monitor environment|
|US20050086523 *||15 Oct 2003||21 Apr 2005||Zimmer Vincent J.||Methods and apparatus to provide network traffic support and physical security support|
|US20050131668 *||12 Dec 2003||16 Jun 2005||Microsoft Corporation||Systems and methods for bimodal device virtualization of actual and idealized hardware-based devices|
|US20050132022 *||12 Dec 2003||16 Jun 2005||International Business Machines Corporation||Computer system with LAN-based I/O|
|US20060005190 *||30 Jun 2004||5 Jan 2006||Microsoft Corporation||Systems and methods for implementing an operating system in a virtual machine environment|
|US20090172310 *||19 Dec 2008||2 Jul 2009||Teradyne, Inc.||Apparatus and method for controlling memory overrun|
|US20120166795 *||24 Dec 2010||28 Jun 2012||Wood Matthew D||Secure application attestation using dynamic measurement kernels|
|US20140289535 *||16 Nov 2012||25 Sep 2014||V-Key Inc.||Cryptographic System and Methodology for Securing Software Cryptography|
|CN102231116A *||4 Jul 2011||2 Nov 2011||成都市华为赛门铁克科技有限公司||Application program virtualization installing and loading method and device|
|DE202010000226U1 *||19 Feb 2010||19 Aug 2010||American Megatrends, Inc.||Gleichzeitiges Ausführen eines Smartphone-Betriebssystems und eines Desktop-Betriebssystems|
|EP2610774A1 *||15 May 2012||3 Jul 2013||Kaspersky Lab Zao||System and method for detecting malware targeting the boot process of a computer|
|WO2005003958A2 *||16 Jun 2004||13 Jan 2005||Intel Corp||Methods and apparatus to provide secure firmware storage and service access|
|WO2007005718A2 *||3 Jul 2006||11 Jan 2007||Red Hat Inc||Computer system protection based on virtualization|
|WO2007038366A1 *||21 Sep 2006||5 Apr 2007||Intel Corp||Method for computing platform data protection|
|WO2007106565A2 *||14 Mar 2007||20 Sep 2007||Univ Utah Res Found||Extendable framework for distributed applications and data|
|WO2009015422A1 *||28 Jul 2008||5 Feb 2009||Michael Kefaloukos||A computer-implemented security method and system|
|WO2013016433A1 *||25 Jul 2012||31 Jan 2013||Intel Corporation||Facilitating compatible interaction, at least in part|
|WO2013048422A1 *||30 Sep 2011||4 Apr 2013||Hewlett-Packard Development Company, L.P.||Virtualized device control in computer systems|
|U.S. Classification||713/189, 717/138|
|International Classification||G06F21/22, G06F21/00, G06F9/46|
|10 Jan 2002||AS||Assignment|
Owner name: INTEL CORPORATION, CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ZIMMER, VINCENT J.;REEL/FRAME:012459/0605
Effective date: 20011024
|25 Feb 2010||FPAY||Fee payment|
Year of fee payment: 4
|19 Feb 2014||FPAY||Fee payment|
Year of fee payment: 8